Future Internet2015, 7(2), 140-151; doi:10.3390/fi7020140 - published 15 May 2015 Show/Hide Abstract
Abstract: To improve the learning of basic concepts in molecular biology of an undergraduate science class, a pedagogical tool was developed, consisting of learning objectives listed at the end of each lecture and answers to those objectives made available as videos online. The aim of this study was to determine if the pedagogical tool was used by students as instructed, and to explore students’ perception of its usefulness. A combination of quantitative survey data and measures of online viewing was used to evaluate the usage of the pedagogical practice. A total of 77 short videos linked to 11 lectures were made available to 71 students, and 64 completed the survey. Using online tracking tools, a total of 7046 views were recorded. Survey data indicated that most students (73.4%) accessed all videos, and the majority (98.4%) found the videos to be useful in assisting their learning. Interestingly, approximately half of the students (53.1%) always or most of the time used the pedagogical tool as recommended, and consistently answered the learning objectives before watching the videos. While the proposed pedagogical tool was used by the majority of students outside the classroom, only half used it as recommended limiting the impact on students’ involvement in the learning of the material presented in class.
Future Internet2015, 7(2), 110-139; doi:10.3390/fi7020110 - published 12 May 2015 Show/Hide Abstract
Abstract: Quality web service discovery requires narrowing the search space from an overwhelming set of services down to the most relevant ones, while matching the consumer’s request. Today, the ranking of services only considers static attributes or snapshots of current attribute values, resulting in low-quality search results. To satisfy the user’s need for timely, well-chosen web services, we ought to consider quality of service attributes. The problem is that dynamic attributes can be difficult to measure, frequently fluctuate, are context-sensitive and depend on environmental factors, such as network availability at query time. In this paper, we propose the Dynamis algorithm to address these challenges effectively. Dynamis is based on well-established database techniques, such as skyline and aggregation. We illustrate our approach using observatory telescope web services and experimentally evaluate it using stock market data. In our evaluation, we show significant improvement in service selection over existing techniques.
Future Internet2015, 7(2), 94-109; doi:10.3390/fi7020094 - published 6 May 2015 Show/Hide Abstract
Abstract: A wide range of IDS implementations with anomaly detection modules have been deployed. In general, those modules depend on intrusion knowledge databases, such as Knowledge Discovery Dataset (KDD99), Center for Applied Internet Data Analysis (CAIDA) or Community Resource for Archiving Wireless Data at Dartmouth (CRAWDAD), among others. Once the database is analyzed and a machine learning method is employed to generate detectors, some classes of new detectors are created. Thereafter, detectors are supposed to be deployed in real network environments in order to achieve detection with good results for false positives and detection rates. Since the traffic behavior is quite different according to the user’s network activities over available services, restrictions and applications, it is supposed that behavioral-based detectors are not well suited to all kind of networks. This paper presents the differences of detection results between some network scenarios by applying traditional detectors that were calculated with artificial neural networks. The same detector is deployed in different scenarios to measure the efficiency or inefficiency of static training detectors.
Future Internet2015, 7(1), 67-93; doi:10.3390/fi7010067 - published 23 March 2015 Show/Hide Abstract
Abstract: This research investigates the privacy issues that exist on social networking sites. It is reasonable to assume that many Twitter users are unaware of the dangers of uploading a tweet to their timeline which can be seen by anyone. Enabling geo-location tagging on tweets can result in personal information leakage, which the user did not intend to be public and which can seriously affect that user’s privacy and anonymity online. This research demonstrates that key information can easily be retrieved using the starting point of a single tweet with geo-location turned on. A series of experiments have been undertaken to determine how much information can be obtained about a particular individual using only social networking sites and freely available mining tools. The information gathered enabled the target subjects to be identified on other social networking sites such as Foursquare, Instagram, LinkedIn, Facebook and Google+, where more personal information was leaked. The tools used are discussed, the results of the experiments are presented and the privacy implications are examined.
Future Internet2015, 7(1), 50-66; doi:10.3390/fi7010050 - published 2 March 2015 Show/Hide Abstract
Abstract: This study used observation and interviews with participants in “PunCar Action” to understand how participatory design methods can be applied to the education of rural individuals in information and communication technology (ICT). PunCar Action is a volunteer program in which ICT educators tour the rural communities of Taiwan, offering courses on the use of digital technology. This paper makes three contributions: First, we found that participatory design is an excellent way to teach ICT and Web 2.0 skills, co-create community blogs, and sustain intrinsic motivation to use Web applications. Second, PunCar Action provides an innovative bottom-up intergenerational ICT education model with high penetrability capable of enhancing the confidence of rural residents in the use of ICT. Third, the content of basic courses was based on applications capable of making the lives of elderly individuals more convenient, and the advanced course was based on the co-creation of community blogs aimed at reviving the core functions of communities and expanding local industry. Our research was conducted with the use of a non-quantitative index to measure ICT learning performance of participants from a rural community. The results show that PunCar Action emphasizes interpersonal communication and informational applications and creates a collaborative process that encourages rural residents to take action to close the digital divide.
Future Internet2015, 7(1), 26-49; doi:10.3390/fi7010026 - published 3 February 2015 Show/Hide Abstract
Abstract: The significance of approaches to technology-enhanced learning (TEL) has increased rapidly during the last few years. Nowadays in education different approaches such as game-based learning, web-based learning, video-based online courses, and many others are used on a daily basis. However, what defines the success of technology-enhanced learning approaches and how can such approaches be developed in a structured way? Furthermore, what different aspects have to be considered while doing so? To answer these questions, 4567 publications were analyzed in this present literature review in order to recognize the different aspects of implementing technology-enhanced learning approaches. Finally, 20 categories are defined in four main areas that summarize all the aspects in the field of technology-enhanced learning. Moreover, the study also reveals research areas that are important but hardly investigated in the observed journals of this study.